scispace - formally typeset
Journal ArticleDOI

Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit

Frederico Calì, +2 more
- 01 Dec 2000 - 
- Vol. 8, Iss: 6, pp 785-799
Reads0
Chats0
TLDR
A distributed algorithm is proposed that enables each station to tune its backoff algorithm at run-time and indicates that the capacity of the enhanced protocol is very close to the theoretical upper bound in all the configurations analyzed.
Abstract
In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically derive the average size of the contention window that maximizes the throughput, hereafter theoretical throughput limit, and we show that: 1) depending on the network configuration, the standard can operate very far from the theoretical throughput limit; and 2) an appropriate tuning of the backoff algorithm can drive the IEEE 802.11 protocol close to the theoretical throughput limit. Hence we propose a distributed algorithm that enables each station to tune its backoff algorithm at run-time. The performances of the IEEE 802.11 protocol, enhanced with our algorithm, are extensively investigated by simulation. Specifically, we investigate the sensitiveness of our algorithm to some network configuration parameters (number of active stations, presence of hidden terminals). Our results indicate that the capacity of the enhanced protocol is very close to the theoretical upper bound in all the configurations analyzed.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Localization of Unknown Networked Radio Sources Using a Mobile Robot with a Directional Antenna

TL;DR: This paper proposes a particle filter-based localization algorithm that combines a new CSMA model and a new directional antenna model and shows that the algorithm can localize unknown networked radio sources effectively.
Journal ArticleDOI

Throughput behavior of link adaptive 802.11 DCF with MUD capable access node

TL;DR: It is shown that significant throughput gain can be garnered with slight modification in 802.11 distributed coordination function (DCF), and the derived expression has been verified in simulation.
Journal ArticleDOI

A novel Effective Capacity-based framework for providing statistical QoS guarantees in IEEE 802.11 WLANs

TL;DR: A performance model of the IEEE 802.11 MAC layer that employs the notion of Effective Capacity is proposed, which establishes that an IEEE802.11 mobile station can be regarded as a Semi-Markovian bursty server of the On/Off type, with known distributions for the On and Off periods, and subsequently applies known results for Semi- Markovian models to derive the Effective Capacity function of this On/ Off server.
Proceedings ArticleDOI

A multi-priority supported p-persistent MAC protocol for Vehicular Ad Hoc Networks

TL;DR: Both analytical results and simulation experiments show that the proposed MAC protocol is able to ensure the prioritized transmission of the safety packets and also achieve optimal system performance with respect to saturated throughput.
Journal ArticleDOI

An effective medium contention method to improve the performance of IEEE 802.11

TL;DR: An analytical model is developed for the throughput performance of the wireless medium that can accurately predict the system saturation throughput, and can obtain better performance in terms of throughput, fairness, and packet drop.
References
More filters
Journal ArticleDOI

Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics

TL;DR: Two protocols are described for CSMA and their throughput-delay characteristics are given and results show the large advantage CSMA provides as compared to the random ALOHA access modes.
Journal ArticleDOI

Packet Switching in Radio Channels: Part II--The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution

TL;DR: The busy-tone multiple-access mode is introduced and analyzed as a natural extension of CSMA to eliminate the hidden-terminal problem and results show that BTMA with hidden terminals performs almost as well as CSMA without hidden terminals.
Book

TCP/IP Illustrated Vol 1 The Protocols

TL;DR: TCP/IP Illustrated, Volume 1 is a complete and detailed guide to the entire TCP/IP protocol suite - with an important difference from other books on the subject: rather than just describing what the RFCs say the protocol suite should do, this unique book uses a popular diagnostic tool so you may actually watch the protocols in action.
Journal ArticleDOI

IEEE 802.11 Wireless Local Area Networks

TL;DR: The performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function, however, the findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.
Book

Stochastic models in operations research

TL;DR: This course provides an introduction to the modeling and analysis of various random phenomena occurring in operations research and businesses such as inventory theory, queueing theory, genetics, demography, epidemiology, competing populations.
Related Papers (5)